fkie_cve-2006-4096
Vulnerability from fkie_nvd
Published
2006-09-06 00:04
Modified
2024-11-21 00:15
Severity ?
Summary
BIND before 9.2.6-P1 and 9.3.x before 9.3.2-P1 allows remote attackers to cause a denial of service (crash) via a flood of recursive queries, which cause an INSIST failure when the response is received after the recursion queue is empty.
References
cve@mitre.orghttp://docs.info.apple.com/article.html?artnum=305530
cve@mitre.orghttp://lists.apple.com/archives/security-announce/2007/May/msg00004.html
cve@mitre.orghttp://marc.info/?l=bugtraq&m=141879471518471&w=2
cve@mitre.orghttp://marc.info/?l=bugtraq&m=141879471518471&w=2
cve@mitre.orghttp://secunia.com/advisories/21752
cve@mitre.orghttp://secunia.com/advisories/21786
cve@mitre.orghttp://secunia.com/advisories/21790
cve@mitre.orghttp://secunia.com/advisories/21816
cve@mitre.orghttp://secunia.com/advisories/21818
cve@mitre.orghttp://secunia.com/advisories/21828
cve@mitre.orghttp://secunia.com/advisories/21835
cve@mitre.orghttp://secunia.com/advisories/21838
cve@mitre.orghttp://secunia.com/advisories/21912
cve@mitre.orghttp://secunia.com/advisories/21926
cve@mitre.orghttp://secunia.com/advisories/22298
cve@mitre.orghttp://secunia.com/advisories/24950
cve@mitre.orghttp://secunia.com/advisories/25402
cve@mitre.orghttp://security.freebsd.org/advisories/FreeBSD-SA-06:20.bind.asc
cve@mitre.orghttp://security.gentoo.org/glsa/glsa-200609-11.xml
cve@mitre.orghttp://securitytracker.com/id?1016794
cve@mitre.orghttp://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.481241
cve@mitre.orghttp://www-1.ibm.com/support/docview.wss?uid=isg1IY89169
cve@mitre.orghttp://www-1.ibm.com/support/docview.wss?uid=isg1IY89178
cve@mitre.orghttp://www.kb.cert.org/vuls/id/697164Patch, US Government Resource
cve@mitre.orghttp://www.mandriva.com/security/advisories?name=MDKSA-2006:163
cve@mitre.orghttp://www.niscc.gov.uk/niscc/docs/re-20060905-00590.pdf?lang=enPatch
cve@mitre.orghttp://www.novell.com/linux/security/advisories/2006_23_sr.html
cve@mitre.orghttp://www.novell.com/linux/security/advisories/2006_24_sr.html
cve@mitre.orghttp://www.openbsd.org/errata.html
cve@mitre.orghttp://www.openpkg.com/security/advisories/OpenPKG-SA-2006.019.html
cve@mitre.orghttp://www.securityfocus.com/archive/1/445600/100/0/threaded
cve@mitre.orghttp://www.securityfocus.com/bid/19859
cve@mitre.orghttp://www.ubuntu.com/usn/usn-343-1
cve@mitre.orghttp://www.us.debian.org/security/2006/dsa-1172
cve@mitre.orghttp://www.vupen.com/english/advisories/2006/3473
cve@mitre.orghttp://www.vupen.com/english/advisories/2006/3511
cve@mitre.orghttp://www.vupen.com/english/advisories/2007/1401
cve@mitre.orghttp://www.vupen.com/english/advisories/2007/1939
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/28744
cve@mitre.orghttps://issues.rpath.com/browse/RPL-626
cve@mitre.orghttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9623
cve@mitre.orghttps://www2.itrc.hp.com/service/cki/docDisplay.do?docId=c00967144
cve@mitre.orghttps://www2.itrc.hp.com/service/cki/docDisplay.do?docId=c00967144
cve@mitre.orghttps://www2.itrc.hp.com/service/cki/docDisplay.do?docId=c00967144
cve@mitre.orghttps://www2.itrc.hp.com/service/cki/docDisplay.do?docId=c00967144
af854a3a-2127-422b-91ae-364da2661108http://docs.info.apple.com/article.html?artnum=305530
af854a3a-2127-422b-91ae-364da2661108http://lists.apple.com/archives/security-announce/2007/May/msg00004.html
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=141879471518471&w=2
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=141879471518471&w=2
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/21752
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/21786
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/21790
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/21816
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/21818
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/21828
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/21835
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/21838
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/21912
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/21926
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/22298
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/24950
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/25402
af854a3a-2127-422b-91ae-364da2661108http://security.freebsd.org/advisories/FreeBSD-SA-06:20.bind.asc
af854a3a-2127-422b-91ae-364da2661108http://security.gentoo.org/glsa/glsa-200609-11.xml
af854a3a-2127-422b-91ae-364da2661108http://securitytracker.com/id?1016794
af854a3a-2127-422b-91ae-364da2661108http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.481241
af854a3a-2127-422b-91ae-364da2661108http://www-1.ibm.com/support/docview.wss?uid=isg1IY89169
af854a3a-2127-422b-91ae-364da2661108http://www-1.ibm.com/support/docview.wss?uid=isg1IY89178
af854a3a-2127-422b-91ae-364da2661108http://www.kb.cert.org/vuls/id/697164Patch, US Government Resource
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDKSA-2006:163
af854a3a-2127-422b-91ae-364da2661108http://www.niscc.gov.uk/niscc/docs/re-20060905-00590.pdf?lang=enPatch
af854a3a-2127-422b-91ae-364da2661108http://www.novell.com/linux/security/advisories/2006_23_sr.html
af854a3a-2127-422b-91ae-364da2661108http://www.novell.com/linux/security/advisories/2006_24_sr.html
af854a3a-2127-422b-91ae-364da2661108http://www.openbsd.org/errata.html
af854a3a-2127-422b-91ae-364da2661108http://www.openpkg.com/security/advisories/OpenPKG-SA-2006.019.html
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/445600/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/19859
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/usn-343-1
af854a3a-2127-422b-91ae-364da2661108http://www.us.debian.org/security/2006/dsa-1172
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2006/3473
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2006/3511
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2007/1401
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2007/1939
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/28744
af854a3a-2127-422b-91ae-364da2661108https://issues.rpath.com/browse/RPL-626
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9623
af854a3a-2127-422b-91ae-364da2661108https://www2.itrc.hp.com/service/cki/docDisplay.do?docId=c00967144
af854a3a-2127-422b-91ae-364da2661108https://www2.itrc.hp.com/service/cki/docDisplay.do?docId=c00967144
af854a3a-2127-422b-91ae-364da2661108https://www2.itrc.hp.com/service/cki/docDisplay.do?docId=c00967144
af854a3a-2127-422b-91ae-364da2661108https://www2.itrc.hp.com/service/cki/docDisplay.do?docId=c00967144
Impacted products
Vendor Product Version
isc bind 9.2.0
isc bind 9.2.1
isc bind 9.2.2
isc bind 9.2.3
isc bind 9.2.4
isc bind 9.2.5
isc bind 9.2.6
isc bind 9.3
isc bind 9.3.0
isc bind 9.3.1
isc bind 9.3.2



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:isc:bind:9.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA6520F4-B203-400A-8629-8A40B739DB11",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "2AF07E87-B109-4B15-A358-7A454502E077",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "614C9459-D526-4880-AE03-4A1558CB941F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CFA05CD-0BE4-4E85-A3DE-8B3E2622159F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "D43375C5-0736-43DE-99B5-B75719D0AD0F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.2.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "E4360536-0BA6-41DB-AA87-45AFB51562CD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.2.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "438AEC8C-DD71-4A25-9E9D-A89415F7EC83",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "8FA93166-513D-40AA-9855-FC89060BA03C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "847C1017-F964-4A33-BEA8-DDB202DD0FB6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B0D8854-64B6-42C9-B4D2-B2AF16AC0F03",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "92F95086-3107-4C38-BB3B-7BABA9BD15C3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "BIND before 9.2.6-P1 and 9.3.x before 9.3.2-P1 allows remote attackers to cause a denial of service (crash) via a flood of recursive queries, which cause an INSIST failure when the response is received after the recursion queue is empty."
    },
    {
      "lang": "es",
      "value": "BIND anterior a 9.2.6-P1 y 9.3.x anterior a 9.3.2-P1 permite a un atacante remoto provocar denegaci\u00f3n de servicio (caida) a trav\u00e9s de una inundaci\u00f3n de preguntas recurrentes, que causan una fallo de INSIST cuando se recibe la respuesta despu\u00e9s de que la cola recursiva est\u00e9 vac\u00eda."
    }
  ],
  "id": "CVE-2006-4096",
  "lastModified": "2024-11-21T00:15:09.387",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2006-09-06T00:04:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://docs.info.apple.com/article.html?artnum=305530"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://lists.apple.com/archives/security-announce/2007/May/msg00004.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://marc.info/?l=bugtraq\u0026m=141879471518471\u0026w=2"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://marc.info/?l=bugtraq\u0026m=141879471518471\u0026w=2"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/21752"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/21786"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/21790"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/21816"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/21818"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/21828"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/21835"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/21838"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/21912"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/21926"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/22298"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/24950"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/25402"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://security.freebsd.org/advisories/FreeBSD-SA-06:20.bind.asc"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://security.gentoo.org/glsa/glsa-200609-11.xml"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securitytracker.com/id?1016794"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2006\u0026m=slackware-security.481241"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www-1.ibm.com/support/docview.wss?uid=isg1IY89169"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www-1.ibm.com/support/docview.wss?uid=isg1IY89178"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/697164"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:163"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://www.niscc.gov.uk/niscc/docs/re-20060905-00590.pdf?lang=en"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.novell.com/linux/security/advisories/2006_23_sr.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.novell.com/linux/security/advisories/2006_24_sr.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.openbsd.org/errata.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.openpkg.com/security/advisories/OpenPKG-SA-2006.019.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/445600/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/19859"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.ubuntu.com/usn/usn-343-1"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.us.debian.org/security/2006/dsa-1172"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2006/3473"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2006/3511"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2007/1401"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2007/1939"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28744"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://issues.rpath.com/browse/RPL-626"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9623"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://www2.itrc.hp.com/service/cki/docDisplay.do?docId=c00967144"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://www2.itrc.hp.com/service/cki/docDisplay.do?docId=c00967144"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://www2.itrc.hp.com/service/cki/docDisplay.do?docId=c00967144"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://www2.itrc.hp.com/service/cki/docDisplay.do?docId=c00967144"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://docs.info.apple.com/article.html?artnum=305530"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.apple.com/archives/security-announce/2007/May/msg00004.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=bugtraq\u0026m=141879471518471\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=bugtraq\u0026m=141879471518471\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/21752"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/21786"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/21790"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/21816"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/21818"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/21828"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/21835"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/21838"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/21912"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/21926"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/22298"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/24950"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/25402"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://security.freebsd.org/advisories/FreeBSD-SA-06:20.bind.asc"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://security.gentoo.org/glsa/glsa-200609-11.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securitytracker.com/id?1016794"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2006\u0026m=slackware-security.481241"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www-1.ibm.com/support/docview.wss?uid=isg1IY89169"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www-1.ibm.com/support/docview.wss?uid=isg1IY89178"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/697164"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:163"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.niscc.gov.uk/niscc/docs/re-20060905-00590.pdf?lang=en"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.novell.com/linux/security/advisories/2006_23_sr.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.novell.com/linux/security/advisories/2006_24_sr.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openbsd.org/errata.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openpkg.com/security/advisories/OpenPKG-SA-2006.019.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/445600/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/19859"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/usn-343-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.us.debian.org/security/2006/dsa-1172"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2006/3473"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2006/3511"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2007/1401"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2007/1939"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28744"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://issues.rpath.com/browse/RPL-626"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9623"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www2.itrc.hp.com/service/cki/docDisplay.do?docId=c00967144"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www2.itrc.hp.com/service/cki/docDisplay.do?docId=c00967144"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www2.itrc.hp.com/service/cki/docDisplay.do?docId=c00967144"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www2.itrc.hp.com/service/cki/docDisplay.do?docId=c00967144"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vendorComments": [
    {
      "comment": "Not Vulnerable.  This issue was found and fixed as part of Red Hat Enterprise Linux 4 update 4:\nhttp://rhn.redhat.com/errata/RHBA-2006-0288.html\n\nand Red Hat Enterprise Linux 3 update 8:\nhttp://rhn.redhat.com/errata/RHBA-2006-0287.html\n\nThis issue does not affect Red Hat Enterprise Linux 2.1",
      "lastModified": "2006-09-08T00:00:00",
      "organization": "Red Hat"
    }
  ],
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.